Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bug: cve exploiting malicious connection header #189

Merged
merged 3 commits into from Feb 20, 2022
Merged

Conversation

prometherion
Copy link
Member

Closes #188.

We strongly suggest upgrading ASAP capsule-proxy to mitigate this CVE that doesn't have direct mitigation.

@prometherion prometherion modified the milestone: v0.2.1 Feb 18, 2022
@prometherion prometherion force-pushed the issues/188 branch 4 times, most recently from 7df5f5f to 5af031a Compare February 18, 2022 21:08
@enj
Copy link

enj commented Feb 18, 2022

@prometherion it would be great if a GHSA could be created once this fix is released.

@prometherion prometherion force-pushed the issues/188 branch 2 times, most recently from 553af54 to 6b0536d Compare February 18, 2022 21:40
Copy link
Member

@bsctl bsctl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm thanks for the nice work

Copy link
Collaborator

@MaxFedotov MaxFedotov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Lgtm!

@prometherion prometherion merged commit d85232c into master Feb 20, 2022
@prometherion prometherion deleted the issues/188 branch February 20, 2022 21:45
func (n *kubeFilter) removingHopByHopHeaders(request *http.Request) {
connectionHeaderName, upgradeHeaderName, requestUpgradeType := "connection", "upgrade", ""

if httpguts.HeaderValuesContainsToken(request.Header[connectionHeaderName], upgradeHeaderName) {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

request.Header[connectionHeaderName] is incorrect due to casing of connectionHeaderName.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Privilege escalation vulnerability via malicious "Connection" header
4 participants